Miggo Logo

CVE-2020-28279: flattenizer vulnerable to prototype pollution

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.85855%
Published
5/24/2022
Updated
4/10/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
flattenizernpm>= 0.0.5, <= 1.0.51.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

  1. The vulnerability documentation explicitly names 'unflatten()' as the vulnerable function.
  2. The PoC demonstrates exploitation through unflatten()
  3. The GitHub fix shows prototype pollution prevention was added to the property explosion logic called by unflatten
  4. The CWE-1321 mapping confirms this is a prototype pollution vulnerability in object property handling
  5. The commit diff modifies the unflatten-related logic to skip proto properties

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Ov*rvi*w Prototyp* pollution vuln*r**ility in ‘*l*tt*niz*r’ v*rsions *.*.* t*rou** *.*.* *llows *n *tt**k*r to **us* * **ni*l o* s*rvi** *n* m*y l*** to r*mot* *o** *x**ution. ### **t*ils T** NPM mo*ul* '*l*tt*niz*r' **n ** **us** *y Prototyp* P

Reasoning

*. T** vuln*r**ility *o*um*nt*tion *xpli*itly n*m*s 'un*l*tt*n()' *s t** vuln*r**l* *un*tion. *. T** Po* **monstr*t*s *xploit*tion t*rou** un*l*tt*n() *. T** *it*u* *ix s*ows prototyp* pollution pr*v*ntion w*s ***** to t** prop*rty *xplosion lo*i* **